Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses 2022
DOI: 10.1145/3545948.3545976
|View full text |Cite
|
Sign up to set email alerts
|

Transferable Graph Backdoor Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…Te backdoor dataset contains the poisoned data, and the clean dataset is composed of clean data without trigger embedding [12,13]. Te GNNs that train the backdoor dataset are called backdoor GNNs, and the clean GNNs are trained on the clean dataset [14]. Te output of backdoor GNNs has two characteristics: (1) the output on the clean data is similar to that of clean GNNs; (2) the output on the poisoned data is predefned by the adversary.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Te backdoor dataset contains the poisoned data, and the clean dataset is composed of clean data without trigger embedding [12,13]. Te GNNs that train the backdoor dataset are called backdoor GNNs, and the clean GNNs are trained on the clean dataset [14]. Te output of backdoor GNNs has two characteristics: (1) the output on the clean data is similar to that of clean GNNs; (2) the output on the poisoned data is predefned by the adversary.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the existing works [15,16] on backdoor attacks are in the area of image and text and few studies on graph backdoor attacks [14,[17][18][19]. However, GNNs are also vulnerable to backdoor attacks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Graph Backdoor Attacks. Backdoor attacks on GNNs have received significant attention in recent years [25,36,37,38,33,39,34]. Regarding graph backdoor attacks, they can be classified into two types based on the employed trigger: universal graph backdoor attacks and adaptive backdoor attacks.…”
Section: Related Workmentioning
confidence: 99%